Kaspersky Lab technology detects a zero-day exploit for Microsoft Windows in the wild

 Kaspersky Lab Automatic Exploit Prevention technology, embedded in most of the company’s endpoint solutions, has detected a series of targeted cyber-attacks. The attacks were attempted by a new piece of malware that exploited a previously unknown zero-day vulnerability in the…

Hackers exploited Telegram messenger zero-day vulnerability to spread multipurpose malware

Hackers exploited Telegram messenger zero-day vulnerability to spread multipurpose malware Kaspersky Lab researchers have uncovered ‘in the wild’ attacks being carried out by a new piece of malware using a zero-day vulnerability in the Telegram Desktop app. The vulnerability was used to…

BoundHook – Exception Based Kernel-Controlled UserMode Hooking

BoundHook – Exception Based Kernel-Controlled UserMode Hooking   Author: Kasif Dekel, Security Researcher at CyberArk Prologue In this article, we’ll present a new hooking technique that we have found during our research work. Hooking techniques give you control over the…

EVERYONE SHOULD BE A HACKER – AND THIS IS WHY!

EVERYONE SHOULD BE A HACKER – AND THIS IS WHY! This glimpse of the future was crafted by: Jacob Lindsay Three cups of coffee in on a September night in 2016, Buiksloterham’s citizens are exchanging some serious words about the…

One New Zero-Day Vulnerability Discovered on Average Every Week in 2015 – Twice the Rate of a Year Ago

One New Zero-Day Vulnerability Discovered on Average Every Week in 2015 – Twice the Rate of a Year Ago ·         Symantec Report Reveals a Record Nine Mega Breaches; ·         Half a Billion Personal Records Stolen or Lost in 2015; ·         Crypto-ransomware attacks grew…

Trend Micro Discovers Apache Cordova Vulnerability that Allows One-Click Modification of Android Apps

Trend Micro’s Mobile Threats Research team has discovered a vulnerability in the Apache Cordova app framework (used to develop Android apps) that allows potential attackers to modify the appearance and behavior of apps just by clicking a specially-crafted URL. This…

FREAK Vulnerability Existing Since the 1990s

A newly discovered vulnerability believed to exist since the 90s has been discovered. Dubbed as FREAK, (Factoring RSA Export Keys), the vulnerability forces a secure connection to use weaker encryption—making it easy for cybercriminals to decrypt sensitive information. The flaw came about…

Trend Micro a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms

Trend Micro a Leader in Gartner Magic Quadrant for Endpoint Protection Platforms SINGAPORE, Jan. 27, 2014 – According to Trend Micro’s recent H1 Targeted Attack Trends Report, threat actors targeting the APAC region are consistently refining their targeted attack tactics, which allows…

Flash Greets 2015 With New Zero-Day Vulnerability

Flash Greets 2015 With New Zero-Day Vulnerability 23 January 2015 – Trend Micro has recently learned of a new problem affecting Adobe Flash. This is a serious situation that affects nearly everyone using Microsoft Windows. Below is a very easy-to-understand summary of…

Trend Micro’s Q3 Security Roundup Details Unprecedented Vulnerabilities and New, Sophisticated Techniques

Trend Micro’s Q3 Security Roundup Details Unprecedented Vulnerabilities and New, Sophisticated Techniques Shellshock revelation, new attacks against mobile and web platforms dissected in quarterly report   Singapore, Dec. 3, 2014 – The third quarter saw a significant event with the new critical vulnerability, known as…

Threat Actors Targeting APAC Region Continue to Enhance Attack Tactics whilst Exploiting Old Vulnerabilities

Threat Actors Targeting APAC Region Continue to Enhance Attack Tactics whilst Exploiting Old Vulnerabilities Trend Micro’s H1 2014 Targeted Attack Trends Report finds that threat actors are still largely able to avoid detection by refining their targeted attack methods Singapore,…

Trend Micro Raises Awareness about Microsoft Windows SChannel Vulnerability

Trend Micro Raises Awareness about Microsoft Windows SChannel Vulnerability Versions dating back to Windows ‘95 susceptible SINGAPORE – 14 November 2014 – With the revelation of a nearly two-decade old flaw in Microsoft Windows Secure Channel (SChannel), Trend Micro Incorporated…

Internet Explorer Zero-Day Hits All Versions In Use

Over the weekend, Microsoft released Security Advisory 2963983 which describes a new zero-day vulnerability found in Internet Explorer. This remote code execution vulnerability allows an attacker to run code on a victim system if the user visits a website under the control…

"By Tech Enthusiasts, For Tech Enthusiasts".

The Tech Revolutionist was established in 2012 to bring the latest news from the PC DIY scene to the readers in Singapore. We have now expanded into many other areas in technology, covering a wide scope of topics from lifestyle consumer to enterprise products.

Forget about pretty faces and handsome presenters. Here at The Tech Revolutionist, we go deep into technology to look at how things work, and how it affects the society today.

That's why, our writers are all professionals in the tech industry.

"Think Tech. Speak Tech. Breathe Tech"